IDG News Service - U.S. lawmakers need to make sure privacy safeguards are in place before pushing electronic health records (EHR) on the public, senators and witnesses said at a Senate Judiciary Committee hearing today.
Health IT improvements are needed to improve the quality and efficiency of health care in the U.S., but patients might be wary of electronic health records without strong privacy safeguards built in, Sen. Patrick Leahy (D-Vt.) said.
"If you don't have adequate safeguards to protect privacy, many Americans aren't going to seek medical treatment," Leahy said. "Health care providers who think there's a privacy risk ... are going to see that as inconsistent with their professional obligations, and they won't want to participate."
An $825 billion economic stimulus package, called the American Recovery and Reinvestment Act, includes $20 billion targeted toward health IT efforts. The bill, which could come before the full House for a vote this week, establishes an Office of the National Coordinator for Health Information Technology, which will be responsible for driving health IT standards.
The bill would also create a national health IT research center and a series of health IT extension centers to help health care providers and patients adopt EHRs. It would also fund grant programs to help health care providers adopt health care technologies and EHRs.
The bill would also provide EHR incentive payments to health care professionals, with a $15,000 payment if EHRs are adopted in the first year and declining payments after that. Hospitals would also receive incentive payments.
The bill includes several privacy provisions. It extends privacy requirements to business associates of health care providers, and it requires the U.S. Department of Health and Human Services to put out annual guidance on the most effective privacy safeguards. The bill also requires health care providers to notify customers of any security breaches.
Microsoft, which has its own EHR product, sees the necessity of building in security, said Michael Stokes, principal program manager in the company's health solutions group. "Health data is often considered more sensitive than other personally identifiable information," he said. "If health data is stolen or lost, it is not simply a matter of recovering financial assets. It can impact an individual's employment, ability to receive health care and social standing."
The stimulus package is a great opportunity to push health IT and health reform, said Deven McGraw, director of the Health Privacy Project at the Center for Democracy and Technology. "It will help us create the information superhighway for health, that will improve health care quality and engage more consumers in their care," she said to the Judiciary Committee.
While U.S. residents support a push toward greater use of IT in health care, they remain concerned about potential privacy problems, McGraw added. "Building trust in these systems is absolutely critical to realizing the benefits of this technology," she added.
Lawmakers need to balance privacy with the benefits that health IT can provide, said David Merritt, project director at the Center for Health Transformation and the Gingrich Group. "Privacy cannot be compromised, but neither can we compromise progress in pulling our health care system out of the technological Stone Age," Merritt said. "We need to find the right balance between privacy at all costs and progress at any cost."
But privacy and progress don't have to conflict, McGraw said. Privacy is "not an obstacle; in fact, the opposite is true," she said. "Enhanced privacy and security developed in health IT will bolster consumer trust."
Whatever privacy and security safeguards are put in place, they will have to change as the industry develops, added James Hester, director of the Vermont Health Care Reform Commission. "The balance point is not static; it will evolve," he said. "We fully expect that the implementation of the initial privacy policies in the growing set of pilot health IT initiatives will teach us important lessons in the next couple of years."
- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
- A walking tour: 33 questions to ask about your company's security
- 15 social media scams
- The 7 elements of a successful security awareness program
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Harness IT -- An Introduction to Business Intelligence Solutions
- Learn the key selection criteria required to provide your organization with the capability to address structured data, unstructured data and mobile demands so...
- Business Intelligence Shows its Smarts
- Today's Business Intelligence (BI) tools provide a new way to think about data with self-service capabilities and user-friendly analytics that can be used...
- Proactive Planning for Big Data
- Big data is less about the terabytes and more about the query tools and business intelligence needed to make sense of massive amounts...
- Inquiry Spotlight: Consumer-Facing Identity
- The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. All Government IT White Papers
- Becoming An Analytics Driven Organization
- Join us on Tuesday, June 18, 2013, 11:00 AM EDT and learn how your agency can create an analytics culture that will enable...
- 3 Reasons Why Sepaton is the World's Fastest Backup Solution
- Leading analyst, Storage Switzerland learns how Sepaton backs up and deduplicates massive data volumes while maintaining the industry's fastest performance - all in...
- Enterprise File Sharing: All You Need to Know
- Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with...
- Bridging HTTP and FTP with FileXpress Internet Server
- What if you could take an FTP server on your internal network, and allow external users (partners or customers) to securely access it...
- MFT and FileXpress - An Overview
- Business users and applications exchange files on a regular basis. File transfer is a core part of the flow of business activity. All Government IT Webcasts